计算机网络与因特网(第5版

计算机网络与因特网(第5版

作者:科姆(Douglas E.Comer)

出版社:清华大学出版社

出版年:2010-09-01

评分:5分

ISBN:9787302235774

所属分类:网络科技

书刊介绍

计算机网络与因特网(第5版 目录

Preface PART I Introduction And internet Applications Chapter 1 Introduction And Overview 11.1 Growth Of Computer Networking I1.2 WhV Networking Seems Complex 21.3 The Five Key ASDects Of Networking 21.4 Public And Private Parts Of The internet 61.5 Networks, Interoperability, And Standards 81.6 Protocol Suites And Layering Models 91.7 How Data Passes Through Layers 111.8 Headers And Lavers 121.9 ISO and the OSI Seven Laver Reference Model 131.10 The inside ScoOD 131.11 Remainder Of The Text 141.12 SummarV 15Chapter 2 Internet Trends 172.1 Introduction 172.2 Resource Sharing 172.3 Growth Of The internet 182.4 From Resource Sharing TO Communication 212.5 From Text TO Multimedia ZI2.6 Recent Trends 222.7 SummarV 23Chapter 3 Internet Applications And Network Proqrammina 273.1 Introduction 273.2 Two Basic internet Communication Paradigms 283.3 Connection-oriented Communication 293.4 The Client-Server MOdel Of interaction 303.5 Characteristics Of Clients And Servers 313.6 Server Programs And Server-Class Computers 313. 7 Reauests, Responses, And Direction Of Data Flow 323.8 MultiDle Clients And MultlDle Servers 323.9 Server identification And DemultiDlexing 333.10 Concurrent Servers 343.11 Circular DeDendencies Among Servers 353.12 Peer-TO-Peer interactions 353.13 Network Programming And The Socket API 363.14 Sockets, Descrlptors, And Network I/O 363.15 Parameters And The Socket API 373.16 SOcket Calls in A Client And Server 383.17 Socket Functions Used By Both Client And Server 383.18 The Connection Function Used Only By A Client 403.19 Socket Functions Used Only BV A Server 403.20 Socket Functions Used With The Message Paradl.gm 433.21 Other Socket Functions 443.22 Sockets, Threads, And inheritance 453.23 SummarV 45Chapter 4 Traditional Internet Applications 494.1 Introduction 494.2 ADDlication-Laver Protocols 494.3 Representation And Transfer 504.4 Web Protocols 514.5 Document Representation With HTML 524.6 Uniform Resource Locators And HvDerlinks 544.7 Web Document Transfer WI.th HTTP 554.8 Caching in Browsers 574.9 Browser Architecture 594.10 File Transfer Protocol (FTP) 594.11 FTP Communication Paradigm 604.12 Electronic Mail 634.13 The Simple Mail Transfer Protocol (SMTP) 644.14 lSPs, Mail Servers, And Mail Access 664.15 Mail Access Protocols (pOP, IMAP) 674.16 Email Representation Standards (RFC2822, MIME) 674.17 Domain Name System (DNS) 694.18 Domain Names That Begin With www 714.19 The DNS HI.erarchy And Server Model 724.20 Name Resolution 724.21 Caching in DNS Servers 744.22 Types Of DNS Entries 754.23 Aliases And CNAME Resource Records 764.24 Abbreviations And The DNS 764.25 Intemationalized Domain Names 774.26 Extensible Representations (XML) 784.27 SummarV 79PART 11 Data Communication Basics 83Chapter 5 Overview Of Data Communications 855.1 Introduction 855.2 The Essence Of Data Communications 86y Data Communications 865.3 Motivation And ScoDe Of The SubieCt 875.4 The COnceptual Pieces Of A Communication System 875.5 The Subtopics Of Data Communications 905.6 SummarV giChapter 6 Information Sources And Signals 936.1 Introduction 936.2 In[Ormation Sources 936.3 Analog And Digital Signals 946.4 Periodic And ADeriodic Signals 94periodic Signals 946.5 Sine Waves And Signal Characteristics 956.6 ComDosite Signals 976.7 The ImDortance Of ComDosite Signals And Sine Functions 976.8 Time And Freauencv Domain ReDresentations 986.9 Bandwidth Of An Analog Signal 996.10 Digital Signals And Signal Levels 1006.11 Band And Bits Per Second 1016.12 Converting A Digital Signal To Analog 1026.13 The Bandwidth Of A Digital Signal 1036.14 Synchronization And Agreement About Signals 1036.15 Line COding 1046.16 Manchester Encoding Used in Computer Networks 1066.17 Converting An Analog Signal To Digital 1076.18 The Nvquist Theorem And SamDline Rate 1086.19 Nvquist Theorem And TeleDhone System Transmission 1086.20 Encoding And Data Compression 1096.21 SummarV 110Chapter 7 Transmission Media 1137.1 Introduction 1137.2 GuidedAnd Unguided Tran

计算机网络与因特网(第5版 本书特色

《计算机网络与因特网(第5版)(影印版)》:大学计算机国外著名教材系列

计算机网络与因特网(第5版 节选

《计算机网络与因特网(第5版)(影印版)》由畅销书作者和网络领域的权威专家Douglas Comer教授编著,全面而系统地介绍了计算机网络知识。全书分5大部分共32章,涵盖的内容广泛,包括网桥、交换、路由与路由协议、多媒体协议与IP技术,以及Web浏览等。《计算机网络与因特网(第5版)(影印版)》第5版在前几版的基础上进行了重新组织和全面修订,新增了无线网络协议、网络性能等*新技术主题。《计算机网络与因特网(第5版)(影印版)》适合作为高等学校计算机、通信、电子等专业的教材或参考书。

计算机网络与因特网(第5版 相关资料

插图:File Scanning. The most straightforward approach to analyze content operates onentire files. File scanning is a well-known technique used by the security software in-stalled on a typical PC. In essence, a file scanner takes a file as input and looks for pat-terns of bytes that indicate a problem. For example, many virus scanners look forstrings of bytes known as a fingerprint. That is, a company that sells a virus scannercollects copies of viruses, places each in a file, finds sequences of bytes that are uncom-mon, and creates a list of all sequences. When a user runs virus scanner software, thesoftware searches files on the user's disk to see if any file contains sequences of bytesthat match items on the list. File scanning works well to catch common problems. Ofcourse, file scanning can produce a false positive if an ordinary file happens to contain astring on the list, and can produce a false negative if a new virus exists that does notcontain any of the strings on the list.Deep Packet Inspection (DP1). The second form of content analysis operates onpackets instead of files. That is, instead of merely examining the headers in packetsthat pass into the site, a DPI mechanism also examines the data in the packet payload.Note that DPI does not exclude header examination —— in many cases, the contents of apayload cannot be interpreted without examining fields in the packet header.As an example of DPI, consider an attack where a slight misspelling of a domainname is used to trick a user into trusting a site. An organization that wants to preventsuch attacks can black-list a set of URLs that are known to be a security risk. Theproxy approach requires every user at the site to configure their browser to use a webproxy (i.e, an intermediate web system that checks a URL before fetching the requestedpage). As an alternative, a Deep Packet Inspection filter can be set up to inspect eachoutgoing packet and watch for an HTTP request to any of the black-listed sites.The chief disadvantage of DPI arises from computational overhead. Because apacket payload in an Ethernet frame can be over twenty times larger than a packetheader, DPI can require twenty times more processing than header inspection. Further-more, the payload is not divided into fixed fields, which means that DPI mechanismsmust parse contents during an inspection.

相关推荐

微信二维码